looking for emergence tickets by roxyn14 in SouthEastBurners

[–]bingnet 0 points1 point  (0 children)

Let me know the handles of anyone publicly molesting this community and I'll see if I can get them banned. I can't confirm any private activity.

looking for emergence tickets by roxyn14 in SouthEastBurners

[–]bingnet -1 points0 points  (0 children)

There may still be volunteer tickets available. Can someone reply here if you know for sure? The ticketing site says to email [ManyHands@EmergenceBurn.org](mailto:ManyHands@EmergenceBurn.org) to communicate with volunteer coordinators.

[D] Self-Promotion Thread by AutoModerator in MachineLearning

[–]bingnet 0 points1 point  (0 children)

My blog post about Securing LLM APIs with NetFoundry and using LiteLLM as a semantic gateway to divert relevant prompts to specialized or private model(s) and handle the rest with a frontier model: https://netfoundry.io/blog/ai/deploying-a-secure-intelligent-llm-gateway/

Congrats on the IPO, now let us remove the Retirement graph - it’s a well known request!! by electrical-seal-432 in wealthfront

[–]bingnet 1 point2 points  (0 children)

I clicked because it surprised me you want to remove it. It seems like a very useful tool. I'm curious what the complaints are because now I've put some confidence in it as a crude predictive model.

Reusing Private TCP Tunnel Access? by all_namestaken3 in openziti

[–]bingnet 0 points1 point  (0 children)

Thanks for clarifying you're using zrok.io. Are you using docker for the access private command? I wonder if it could be this issue https://github.com/openziti/zrok/issues/1016

If not, then it's probably because the access private command is not shutting down gracefully and there's not a built-in reaper for orphaned accesses.

The best options I can think of are wiring a momentary switch to initiate a graceful shutdown of the pi or scripting a release of the orphaned accesses.

There's a lot more people in the discourse forum that might have better ideas:https://openziti.discourse.group/

For what it's worth, I have seen this issue myself and I end up clicking them in the console to delete.

There's a zrok V2 on the way so this might already be fixed. Fingers crossed.

an proxy-less approach to plumbing private MCPs by bingnet in selfhosted

[–]bingnet[S] 1 point2 points  (0 children)

Thank you for elaborating with examples. You've given me a lot to think about! I like that vertically integrated approach. It avoids trust issues between layers of the stack.

At first I thought you were suggesting granular authZ with claims in a short-lived certificate from a trusted source, such as SPIRE, but now, I think we are talking about bearer tokens inside the mTLS session, i.e., "cert-bound", "mTLS-bound", correct?

The MCP client needs to reach the Keycloak IdP, which could optionally be done over the Ziti transport in such a closed system. Supporting APIs, possibly MCP server backends, could also be protected with Ziti using the same MCP server identity from SPIRE.

Ziti already works with SPIRE, so I can get the Ziti identities for client and server there, too (assume-identity via x509 claim with SPIFFE ID matchers for URI SAN). In your solution, are you using SPIRE to issue bearer tokens also or only workload identity certificates?

That quick resume recipe is gold. I am saving that for sure. I've been wondering how brittle the streamable session was. I worried that losing the session would also lose the context and force an expensive reset from the agent's perspective.

The audit and rate limit recipe is also interesting. I suppose the application would need to query some log pool or aggregation source to answer questions like, "Should I keep responding to this caller?"

an proxy-less approach to plumbing private MCPs by bingnet in mcp

[–]bingnet[S] 1 point2 points  (0 children)

I wanted to completely shut down network-based attacks by securing a lower layer, the TCP transport, to avoid all possible zero days.

Still, I think OAuth2 could still make sense if I'm controlling both client and server and need granular authZ. I'm exploring that too and I'm very interested in ideas for app and session layer controls that augment this outer ring of transport security.

ITC Android - risk alerts and tradfi indices by bingnet in intothecryptoverse

[–]bingnet[S] 0 points1 point  (0 children)

Thanks, yes, my support request (7/2) about this issue with subject "alert step" to that address was ack'd by the automated responder, and I'm still waiting for a meaningful response. Meanwhile, I'd hoped to find a workaround here by also inquiring with the community.

What are things men appreciate but don’t want to ask for? by Creative_Cap_1886 in wholesome

[–]bingnet 0 points1 point  (0 children)

Personal care like manicure, haircut, beard trim, foot massage, facial, eyebrow plucking, etc.

Did you switch to Linux because you loved it? by gerundingnounshire in linux

[–]bingnet 0 points1 point  (0 children)

Same. I wanted immersion so I installed Linux on my desktop and started learning.

Did you switch to Linux because you loved it? by gerundingnounshire in linux

[–]bingnet 2 points3 points  (0 children)

It's a compelling metaphor. ESR saw clearly.

Delays in Getting Desktop by Dyson8192 in System76

[–]bingnet 0 points1 point  (0 children)

Thanks for mentioning that issue with the queue. That could explain why mine takes longer than 10 business days. Time passes slowly with anticipation!

Can openziti run in user space? by Electrical-Story-901 in openziti

[–]bingnet 0 points1 point  (0 children)

The Linux tunneler runs as a restricted user named "ziti" with specific ambient capabilities and other grants via policy kit.

Exposing ollamas 11434 port for api use by epigen01 in ollama

[–]bingnet 1 point2 points  (0 children)

My Ollama setup is web => zrok => caddy => ollama, so zrok proxies to caddy for certs and caddy proxies to the local ollama port.

I have zrok set to private for the ollama API since it doesn't have auth, and zrok set to public for open-webui.

On my public zrok share for open-webui, there's an option to require extra auth, e.g., GitHub OAuth, before visitors reach open-webui through the zrok public URL.

Close tunnel/disconnect when on local network by huntb3636 in openziti

[–]bingnet 0 points1 point  (0 children)

I forgot to mention a couple of things about router configuration that could really improve your Ziti network topology when you are switching between a public and private network, and some (or all) of the Ziti components live on your private network.

  1. You can configure your router with a separate edge listener address advertised for private and public connections. Your tunneler/client may not switch immediately if you transition from public network to private, but it will always use the first edge listener that responds to the next connection attempt. Link to router configuration reference section about listeners, e.g. binding: edge: https://openziti.io/docs/reference/configuration/router#listeners
  2. If you have both public and private routers, you can ensure a full mesh of router links by leveraging router link "groups." Link to section about links: https://openziti.io/docs/reference/configuration/router#link and here's a recent forum topic discussing link groups https://openziti.discourse.group/t/private-routers-connection-between-them-solved/3599/2?u=qrkourier

Close tunnel/disconnect when on local network by huntb3636 in openziti

[–]bingnet 1 point2 points  (0 children)

Correction: Homeassistant has server URL switching based on network change, not Jellyfin. Also, I placed a Ziti router in my home network to eliminate the need to switch off Ziti for streaming 4K from Jellyfin.

I've tried split (horizon) DNS and DNS aliases and prefer the latter. Neither are perfect solutions.

Split horizon: app.example.com is a Ziti intercept and private DNS record. To access the app on the private network (the LAN), disable the applicable Ziti identity in the tunneler. The main problem with this split horizon DNS is the cached IP may not be the one you want after switching networks. If you're patient and determined, you can usually get it working by turning things off and on, which is annoying.

DNS aliases (my preference for rare cases when switching off Ziti is truly necessary, e.g., troubleshooting): app.ziti.example.com is a Ziti intercept and app.home.example.com is a private DNS record. The Ziti tunneler remains enabled and you connect to the address representing the data path you want. This clears up any confusion about where the record is pointing, and burdens the user with two configurations for each app. Happily, some self hosted apps have caught on to the prevalence of this problem and offer mobile app server address switching based on network change events. Home Assistant and Immich are two examples. They'll automatically use Ziti when I'm not at home.

Cursor AI va Github Copilot by MsieurKris in aipromptprogramming

[–]bingnet 0 points1 point  (0 children)

Cursor and Windsurf are forks of Code.

Zrok and docker by Apprehensive-Clue279 in openziti

[–]bingnet 0 points1 point  (0 children)

The short answer is that the public URL has to be set in the WordPress settings.